Web Application Exploit Development
a11y.text Web Application Exploit DevelopmentTable of Contents
a11y.text Table of Contents- Metasploit Unleashed
- Donate – Help Feed a Child
- Introduction
- Metasploit Fundamentals
- Information Gathering
- Vulnerability Scanning
- Writing a Simple Fuzzer
- Exploit Development
- Web App Exploit Dev
- Client Side Attacks
- MSF Post Exploitation
- Meterpreter Scripting
- Maintaining Access
- MSF Extended Usage
- Metasploit GUIs
- Post Module Reference
- Auxiliary Module Reference
- Admin HTTP Auxiliary Modules
- Admin MySQL Auxiliary Modules
- Admin MSSQL Auxiliary Modules
- Admin Postgres Auxiliary Modules
- Admin VMware Auxiliary Modules
- Scanner DCERPC Auxiliary Modules
- Scanner Discovery Auxiliary Modules
- Scanner FTP Auxiliary Modules
- Scanner HTTP Auxiliary Modules
- Scanner MySQL Auxiliary Modules
- Scanner MSSQL Auxiliary Modules
- Scanner IMAP Auxiliary Modules
- Scanner NetBIOS Auxiliary Modules
- Scanner POP3 Auxiliary Modules
- Scanner SMB Auxiliary Modules
- Scanner SMTP Auxiliary Modules
- Scanner SNMP Auxiliary Modules
- Scanner SSH Auxiliary Modules
- Scanner Telnet Auxiliary Modules
- Scanner TFTP Auxiliary Modules
- Scanner VMware Auxiliary Modules
- Scanner VNC Auxiliary Modules
- Server Capture Auxiliary Modules
- Recent Changes to Metasploit Unleashed
Web Application Exploit Development | Metasploit Unleashed
This section of Metasploit Unleashed is going to go over the development of web application exploits in the Metasploit Framework. The web application that we will be using is called dotDefender. The code we are going to use for the base of our exploit can be found on the Exploit-DB website: https://www.exploit-db.com/exploits/14310/